Advisory Details

June 29th, 2006

Apple iTunes AAC File Parsing Integer Overflow Vulnerability

ZDI-06-020
ZDI-CAN-043

CVE ID CVE-2006-1467
CVSS SCORE
AFFECTED VENDORS Apple
AFFECTED PRODUCTS iTunes
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 4282. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Apple iTunes. Exploitation requires an attacker to convince a target user into opening a malicious play list file.

The specific flaw exists during the processing of malicious AAC media files such as those with extensions .M4A and .M4P. During the parsing of the sample table size atom (STSZ), a malformed 'sample_size_table' value can trigger an integer overflow leading to an exploitable memory corruption.

VENDOR RESPONSE Apple has issued an update to correct this vulnerability. More details can be found at:
http://docs.info.apple.com/article.html?artnum=303952
DISCLOSURE TIMELINE
  • 2006-04-07 - Vulnerability reported to vendor
  • 2006-06-29 - Coordinated public release of advisory
CREDIT ATmaCA
BACK TO ADVISORIES